Presenter Photo

Featuring AD Auditing Expert and Managing Partner and Principal Consultant at Security Architects Partners, Dan Blum

Privilege empowers. Admins and other users will, at times, require privileges—it’s an inescapable fact that is paired with an unavoidable security risk. Active Directory (AD) has many options for managing privilege—which is another way of saying that Active Directory provides many possibilities for mismanaging privileges! For instance, in even modestly complex AD environments, enterprises face significant risk of misconfiguration and other oversights that put their security in jeopardy. Unless we create the right privilege management patterns for Active Directory, and then audit to see that they're implemented and operating correctly, potential catastrophe looms.

Tune in to this webinar with Security Architects Partners Principal Consultant Dan Blum, and discover:

  • Active Directory’s role in the cyber kill chain
  • Privilege-related attack vectors to be on the lookout for
  • Privilege management approaches that will help you condense the attack surface—and even mitigate the impact of misconfiguration errors and other mistakes
  • How to identify and fix security gaps through an effective AD audit

If you have concerns that you may be overlooking cyber threats to your Active Directory environment, don’t miss this webinar!

Dan Blum

Managing Partner and Principal Consultant at Security Architects Partners

An internationally recognized expert in cybersecurity, risk management, cloud computing, and identity management, Dan Blum leads or contributes projects such as performing security assessments and developing customers’ risk management programs and identity management or security strategy or architecture road maps. Formerly a Golden Quill award-winning vice president and distinguished analyst at Gartner, Blum has participated in industry groups such as ISACA, IDPro, the Cloud Security Alliance, Kantara Initiative, OASIS and others. He is also the author of the upcoming book “Rational Cybersecurity for the Business.”